Full Disclosure mailing list archives

Re: Dig SCO?


From: Steve Menard <smenard () nbnet nb ca>
Date: Mon, 02 Feb 2004 10:52:17 -0400

they have moved to

www.thescogroup.com

Here is their Partner Alert  from Monday AM  ;-)

From - Mon Feb  2 10:00:48 2004
X-UIDL: -==-=-=-=-=-=-=-=-=-=-=-
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <TeamSCO () sco rsc01 com>
Received: from om-thescogroup.rgc3.net ([66.35.244.29])
          by simmts1-srv.bellnexxia.net
(InterMail vM.5.01.06.05 201-253-122-130-105-20030824) with ESMTP id <20040202130902.PTTS5069.xxxxx.xx.x.x.x () om-thescogroup rgc3 net>
          for <XXXX () XXX XX>; Mon, 2 Feb 2004 08:09:02 -0500
Received: by om-thescogroup.rgc3.net id XXXXXX; Mon, 2 Feb 2004 05:09:02 -0800 (envelope-from <TeamSCO () sco rsc01 com>)
MIME-Version: 1.0
Content-Type: text/plain;
        charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable
Date: Mon, 2 Feb 2004 05:09:02 -0800
From: "SCO Partner Program" <TeamSCO () sco rsc01 com>
Reply-To: "SCO Partner Program" <partners () sco com>
Subject: SCO Partner Alert - MyDoom and Novarg Work-Arounds
X-cid: caldera.XXXX.X
To: XXXXX () XXXX XX
Message-Id: <20040202130902.PTTSXXX9.XXXXX () om-thescogroup rgc3 net>



SCO Partner Alert:

* Mydoom or Novarg Virus Work-arounds
* Mirrored availability of SCO Web site at http://www.thescogroup.com

As you are probably aware, on Monday, January 26, a computer virus called Mydoom (Network Associates' name) or Novarg (Symantec's name) spread quickly across the Internet. Antivirus companies have determined that this worm is coded such that computers infected with the Mydoom variant are set to conduct a distributed denial of service (DDOS) attack against www.sco.com from February 1 - 12.

In short, the virus is activated when users open an innocent-looking e-mail message that contains an attached program file (with a .bat, .cmd, .exe, .pif, .scr, or .zip extension) which then accesses the user's e-mail address book and sends itself to all of that user's contacts. The offending e-mail message usually arrives with a subject line such as "Test," "Hi," or "Mail Transaction Failed."

The SCO Group boldly condemns this latest action, and is taking several active steps to fight against acts of cyber-terrorism such as that launched by the creator(s) of the Mydoom virus.

* On January 27, SCO announced that we are offering a reward of up to a total of $250,000 for information leading to the arrest and conviction of the individual(s) responsible for creating the Mydoom virus.

* SCO is working closely with U.S. law enforcement authorities including the U.S. Secret Service and the Federal Bureau of Investigation (FBI) to determine the identity of the Mydoom creator(s)

* SCO is launching a "mirrored" Web site (which will provide all of the information currently available at www.sco.com) to continue business as usual with partners and customers - see http://www.thescogroup.com

As a valued SCO Solution Provider, your uninterrupted, successful SCO UNIX business is important to us. If you are unable to connect to the information or resources that you need during the targeted dates of the Mydoom virus, please contact SCO right away. For general issues, you can call 1-800-SCO-UNIX or e-mail SCO at partners () sco com. For sales specific concerns, you can call our Inside Sales team at 1-800-726-6561.

Thank you for your continued support,

Darl McBride
President & CEO
The SCO Group

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Current thread: